计算机科学 ›› 2018, Vol. 45 ›› Issue (11A): 535-538.
张光兰, 杨秋辉, 程雪梅, 姜科, 王帅, 谭武坤
ZHANG Guang-lan, YANG Qiu-hui, CHENG Xue-mei, JIANG Ke, WANG Shuai, TAN Wu-kun
摘要: 告警预测是保证整个网络的稳定性和可靠性的技术之一。现有的告警预测技术存在未考虑告警数据的时间顺序、难以获取先验知识等缺陷。由此,提出了一种基于拓扑约束的序列模式挖掘方法以发现有意义的告警序列模式。该方法主要考虑网络节点之间的拓扑连接关系,将其作为告警序列模式挖掘的约束条件;并且为了发现非频繁重大告警模式,改进了序列模式挖掘的剪枝操作,将包含重大告警的序列模式直接保留。实验结果表明,采用基于拓扑约束的序列模式挖掘方法挖掘出的告警序列模式可以提高网络告警预测的精度和效率,并能较准确地预测非频繁的“重大”告警。
中图分类号:
[1]GAO Z,CHEN Z,FENG Y,et al.Mining Sequential Patterns of Predicates for Fault Localization and Understanding[C]∥2013 IEEE 7th International Conference on Software Security and Reliability (SERE).IEEE,2013:109-118. [2]WU P H,PENG W C,CHEN M S.Mining sequential alarm patterns in a telecommunication database [C]∥International Workshop on Databases in Telecommunications.Springer,2001:37-51. [3]NUNEZ M,MORALES R,TRIGUERO F.Automatic discovery of rules for predicting network management events [J].IEEE Journal on Selected Areas in Communications,2002,20(4):736-745. [4]KLEMETTINEN M,MANNILA H,TOIVONEN H.Rule discovery in telecommunication alarm data [J].Journal of Network and Systems Management,1999,7(4):395-423. [5]HATONEN K,KLEMETTINEN M,MANNILA H,et al.Know-ledge discovery from telecommunication network alarm databa-ses [C]∥Proceedings of the Twelfth International Conference on Data Engineering,1996.IEEE,1996:115-122. [6]MANNILA H,TOIVONEN H,VERKAMO A I.Discovery of frequent episodes in event sequences [J].Data Mining and Knowledge Discovery,1997,1(3):259-289. [7]HATONEN K,KLEMETTINEN M,MANNILA H,et al.TA-SA:Telecommunication alarm sequence analyzer or how to enjoy faults in your network [C]∥Network Operations and Management Symposium,1996,IEEE.IEEE,1996:520-529. [8]JAIN-ZHI O,PEI-HSIN W,MING-SYAN C.Experimental results on a constraint based sequential pattern mining for telecommunication alarm data [C]∥Proceedings of the Second International Conference on Web Information Systems Enginee-ring.IEEE,2001:186-193. [9]GARCIA R,LLANA L,MALAGON C,et al.Event Prediction in Network Monitoring Systems:Performing Sequential Pattern Mining in Osmius Monitoring Tool [M]∥Advances in Data Mining:Applications and Theoretical Aspects.Berlin:Springer-Verlag Berlin,2010:632-642. [10]WANG Z,ZHANG B,LI G.A Topological Constraints Based Sequential Data Mining Approach on Telecom Networks Alarm Data [C]∥International Joint Conference on Computational Scien-ces and Optimization,2009(CSO 2009).2009:750-754. [11]MEIRA D M,NOVEMBER B H.A Model For Alarm Correlation in Telecommunications Networks [J].Federal University of Minas Gerais,1998. [12]EIRA D M,NOGUEIRA J M S.Modelling a telecommunication network for fault management applications [C]∥NetworkOpe-rations and Management Symposium,1998(NOMS 98).IEEE.IEEE,1998:723-732. [13]JAUDET M,HUSSAIN A,SHARIF K.Temporal classification for fault-prediction in a real-world telecommunications network [C]∥Proceedings of the IEEE Symposium on Emerging Technologies,2005.IEEE,2005:209-214. [14]ZAKI M J,LESH N,OGIHARA M.Predicting failures in event sequences [M]∥Data Mining for Scientific and Engineering Applications.Springer,2001:515-539. [15]SALFNER F,LENK M,MALEK M.A survey of online failure prediction methods [J].Acm Computing Surveys,2010,42(3):10. [16]ZHONG J,GUO W,WANG Z.Study on network failure prediction based on alarm logs [C]∥2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).2016:1-7. |
[1] | 郭鹏军, 张泾周, 杨远帆, 阳申湘. 飞机机内无线通信网络架构与接入控制算法研究 Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft 计算机科学, 2022, 49(9): 268-274. https://doi.org/10.11896/jsjkx.210700220 |
[2] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[3] | 苏畅, 张定权, 谢显中, 谭娅. 面向5G通信网络的NFV内存资源管理方法 NFV Memory Resource Management in 5G Communication Network 计算机科学, 2020, 47(9): 246-251. https://doi.org/10.11896/jsjkx.190800008 |
[4] | 陆鑫赟, 王兴芬. 基于领域关联冗余的教务数据关联规则挖掘 Educational Administration Data Mining of Association Rules Based on Domain Association Redundancy 计算机科学, 2019, 46(6A): 427-430. |
[5] | 刘晓东, 魏海平, 曹宇. 考虑网络拓扑结构变化的SIRS模型的建立与稳定性分析 Modeling and Stability Analysis for SIRS Model with Network Topology Changes 计算机科学, 2019, 46(6A): 375-379. |
[6] | 张洪泽, 洪征, 王辰, 冯文博, 吴礼发. 基于闭合序列模式挖掘的未知协议格式推断方法 Closed Sequential Patterns Mining Based Unknown Protocol Format Inference Method 计算机科学, 2019, 46(6): 80-89. https://doi.org/10.11896/j.issn.1002-137X.2019.06.011 |
[7] | 孙文平, 常亮, 宾辰忠, 古天龙, 孙彦鹏. 基于知识图谱和频繁序列挖掘的旅游路线推荐 Travel Route Recommendation Based on Knowledge Graph and Frequent Sequence Mining 计算机科学, 2019, 46(2): 56-61. https://doi.org/10.11896/j.issn.1002-137X.2019.02.009 |
[8] | 程珍, 赵慧婷, 章益铭, 林飞. 扩散的多播分子通信网络的比特错误率分析 Bit Error Rate Analysis of Diffusion-based Multicast Molecular Communication Networks 计算机科学, 2019, 46(11): 80-87. https://doi.org/10.11896/jsjkx.181001925 |
[9] | 李智远,李晶,张剑. 基于连通图的天地一体化测控通信网络仿真 Simulation for Integrated Space-Ground TT&C and Communication Network Routing Algorithm 计算机科学, 2018, 45(6A): 295-299. |
[10] | 荣俸萍,方勇,左政,刘亮. MACSPMD:基于恶意API调用序列模式挖掘的恶意代码检测 MACSPMD:Malicious API Call Sequential Pattern Mining Based Malware Detection 计算机科学, 2018, 45(5): 131-138. https://doi.org/10.11896/j.issn.1002-137X.2018.05.022 |
[11] | 朱鹏宇,鲍培明,吉根林. 用户频繁通信关系的并行挖掘算法研究 Parallel Algorithm for Mining User Frequent Communication Relationship 计算机科学, 2018, 45(2): 103-108. https://doi.org/10.11896/j.issn.1002-137X.2018.02.018 |
[12] | 万莹, 洪玫, 陈宇星, 王帅, 樊哲宁. 基于时间、空间和规则的无线网络告警关联方法 Wireless Network Alarm Correlation Based on Time,Space and Rules 计算机科学, 2018, 45(11A): 287-291. |
[13] | 金鑫,李龙威,苏国华,刘晓蕾,季佳男. 基于Spark框架和PSO优化算法的电力通信网络安全态势预测 Prediction about Network Security Situation of Electric Power Telecommunication Based on Spark Framework and PSO Algorithm 计算机科学, 2017, 44(Z6): 366-371. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.083 |
[14] | 王树怡,董东. 基于聚类和偏序序列的API用法模式挖掘 Mining of API Usage Pattern Based on Clustering and Partial Order Sequences 计算机科学, 2017, 44(Z6): 486-490. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.108 |
[15] | 崔展齐,牟永敏,张志华,王伟光. 基于函数调用序列模式挖掘的程序缺陷检测 Defects Detection Based on Mining Function Call Sequence Patterns 计算机科学, 2017, 44(11): 226-231. https://doi.org/10.11896/j.issn.1002-137X.2017.11.034 |
|